Anonymous ID: 4105f9 July 14, 2018, 4:13 a.m. No.2152097   🗄️.is đź”—kun   >>2126

>>2149702

 

May is wearing red, the color of the one guard "Queen's Guard"??

Melania is wearing yellow/gold the color of the other guard ??

 

changing of the guard??

 

https://en.wikipedia.org/wiki/Queen%27s_Guard

I couldn't find the name of the guard in gold uniforms.

 

Vehicles are considered "diplomat" and are exempted from inspection when flying into other countries.

It just so happens that Assange won his case, allowing him safe passage to Equador proper. However, this doesn't protect him from possible assassination attempts.

 

In Rosensteins press conference about the Russian hackers, Wikileaks was not named in the indictment in any way. It was obvious that the emails were sent to them, but they were not even named publicly.

 

There are two days before Pres. Trump needs his car.

This is time enough to transport a very important person to safety.

 

At the visit with Queen Elizabeth

the military guard had something of a "happy pace"

as they marched in front of the stage.

Anonymous ID: 4105f9 July 14, 2018, 4:50 a.m. No.2152234   🗄️.is đź”—kun   >>2237

>>2151864

 

The French Revolution was the most vicious and barbarous displays of inhumanity the world has ever seen. The citizens of America distanced themselves from it and were appalled by it.

 

Read about the origins of this "revolution" here:

Voltaire was an inspiration to many changes in culture

Weishaupth turned Masonic lodges into "Illumined Lodges" which inspired most German and French Masonic lodges to follow suit

 

Through the lodges, members were indoctrinated into violence and vengeance, forced to watch executions of "traitor" members and then to murder them themselves

 

The hate that was taught about elites and priests grew into a bloody onslaught against the population. Anyone who objected were considered traitors as well. The author of this book does not list the tortures imposed on the French people during this time, but assures they are unrivaled in barbarism.

 

https://archive.org/details/1802ProofsOfIlluminismPayson

 

1802 – written in old english (using f for s)

laments on how good people can result in barbarism like french revolution

Anonymous ID: 4105f9 July 14, 2018, 5:01 a.m. No.2152268   🗄️.is đź”—kun

>>2152250

 

Maybe this will give you an idea of what border agents and services are dealing with. Compare with the protocols of Ellis Island

 

https://ravishly.com/2014/08/22/immigration-unaccompanied-children-deportation-detention-centers-violations-facts

 

Allegations in 2014 about conditions in facilities:

 

Some Violations

 

• Many UAC and family units require treatment for communicable diseases, including respiratory illnesses, tuberculosis, chicken pox and scabies.

 

• UAC and family unit illnesses and unfamiliarity with bathroom facilities resulted in unsanitary conditions and exposure to human waste in some holding facilities. Contract cleaners and DHS employees are working to maintain sanitary conditions.

 

• DHS employees reported exposure to communicable diseases and becoming sick on duty.

 

• DHS is holding UAC longer than 72 hours because no permanent shelter is available.

 

Employee-to-UAC ratios are inconsistent. For example: one station had more than 25 UAC for each employee while other facilities ranged from zero to three UAC for each employee; not all facilities post copies of UAC policies in English and Spanish; and not all facilities are systematically maintaining an inventory of UAC property. According to the L.A. Times, there are currently more than 1,000 women and children remaining in the two family detention facilities—536 in Artesia and 532 in Karnes, Texas.

 

“Once medically cleared, residents who have a final order of removal and a valid travel document may be repatriated,” explained Leticia Zamarripa, a spokeswoman with the Department of Homeland Security.

Anonymous ID: 4105f9 July 14, 2018, 5:13 a.m. No.2152326   🗄️.is đź”—kun

>>2151921

 

If you remember:

 

wikileaks was expected to release some very damaging documents the summer of 2016

 

we waited and waited for the big reveal

it never happened

so

some people went searching through the Podesta emails

and began discovering strange references to "pizza related handkerchiefs"

 

the search had not gotten far before the election in November

no big reveal happened of itself

 

was wikileaks holding back

because it didn't want to be blamed

for interfering in the election?

 

am I remembering this correctly?

Anonymous ID: 4105f9 July 14, 2018, 5:27 a.m. No.2152389   🗄️.is đź”—kun

>>2151921

 

No DNC server = no evidence

So –

how do you bring an indictment without evidence of the hack?

You don't.

 

All they have are loaded emails to state election boards

which any webmaster would NEVER open

if they had any sense at all

 

and so

one might think

that this is saying that Seth Rich is not involved

and thus Seth's estate is not liable for any damages

and that theory can be put to rest

 

Stealing files is a crime

even if a patriot does it.

The family who inherited his insurance

would have found themselves in court

 

and then there is this:

 

——————–

michael daniels submitted opening statement

https://www.intelligence.senate.gov/sites/default/files/documents/os-mdaniel-062018.pdf

(excerpted)

 

During President Obama’s administration, I served from June 2012 to January 2017 as the

Special Assistant to the President and Cybersecurity Coordinator on the National Security Council staff. In that capacity, among other things, I oversaw the development of cybersecurity-related policy, coordinated our responses to significant cyber threats and incidents, and facilitated the development of inter-agency plans to disrupt our adversaries’ cyber activities.

 

Going into late spring of 2016, as the Presidential election got into full swing, we fully expected Russian cyber-based espionage activities against the major political campaigns – it had happened in previous election cycles and our operating assumption was that the Russians would target the campaigns for intelligence collection.

 

However, by late June / early July 2016, as information from the Democratic National Committee began to be released, and as a few States began to report intrusions into certain parts of their electoral infrastructure, we realized that the Russians were doing something more than merely collecting intelligence. They were carrying out operations aimed at least at influencing the election and potentially even disrupting it.

 

The goal for this line of effort was to make it more difficult for the Russians to disrupt or interfere with the actual voting process, while maintaining Americans’ confidence in the electoral system. Although many cybersecurity experts have focused on cybersecurity issues surrounding electronic voting machines, we quickly determined that the voting machines, while vulnerable, were not the most vulnerable part of the infrastructure. We also quickly determined that Russia’s goal was probably not to use cyber means to surreptitiously change the outcome of the election by changing votes.

 

In order to achieve that goal, the Russians would have had to have selected the precincts that were going to be close several months in advance, gained undetected access to the voting machines, installed malware that flipped just enough votes to change the outcome but not so many as to be detected, and then remain undetected through any post-election auditing. We did not believe carrying out such an operation was feasible.

 

Instead, we realized that a far more practical goal would be to use cyber means to undermine confidence in the election; once the potential scenarios included more than vote flipping, the potential for malicious activity expanded considerably. Widening the aperture to include the entire electoral process from beginning to end revealed segments that would be much more vulnerable to remote cyber operations. That turned out to be the points at which the electoral infrastructure touches the public internet: voter registration databases; vote tabulation reporting; and media reporting on election day.

 

Since States and local governments run the election process in the U.S., by necessity our efforts became focused on providing assistance to States and localities. The Department of Homeland Security spearheaded those efforts for the Administration. These actions focused on determining what assistance we could provide States and local governments in the near term and alerting States and local governments to the potential threat.

 

Fortunately, we did not detect or discover any significant malicious cyber activity on election day.

 

Now that the Russians have proven that cyber means can be used to engage in election

 

interference in the United States, we should expect that they will continue to engage in such activities and that other actors will follow their lead, including non-nation state actors.

Therefore, I recommend that:

– We continue to invest in improving the cybersecurity of our electoral infrastructure in its entirety, including, but not limited to, voter registration databases, pollbooks, voting machines, vote tabulation, and vote reporting.